SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Exploits stories

Story image
Claroty reveals five vulnerabilities in NETGEAR RAX30 routers
Last month
#
cybersecurity
#
netgear
#
router
Claroty’s research arm, Team82, has disclosed five vulnerabilities in NETGEAR’s RAX30 routers they discovered at the Pwn2Own Toronto hacking competition.
Story image
Attackers deploying exploits faster than ever, finds Rapid7
Wed, 1st Mar 2023
#
cybersecurity
#
it solutions
#
security vulnerabilities
Rapid7 Vulnerability Intelligence Report finds attackers developing and deploying exploits faster, with an 87% increase in first-week exploitation since 2020.
Story image
Secureworks finds Iranian threat group back with new persona
Wed, 1st Feb 2023
#
disruption
#
data leak
#
secureworks
Secureworks has found that the Iranian threat group, Cobalt Sapling, has reemerged with a new persona, Abraham's Ax.
Story image
Claroty’s Team82 finds vulnerabilities in historian server
Thu, 19th Jan 2023
#
cybersecurity
#
security vulnerabilities
#
data breach
Claroty's research team, Team82, has examined the GE Proficy Historian, finding five exploitable vulnerabilities capable of causing damage to the system.
Story image
GreyNoise Intelligence identifies exploitation threats for 2023
Fri, 23rd Dec 2022
#
cybersecurity
#
internet
#
business analyst
“When it comes to cybersecurity, not all vulnerabilities are created equal, and many of the ones that garner media attention actually turn out to be insignificant."
Story image
Lookout finds predatory behaviour on 300 loan apps
Thu, 1st Dec 2022
#
application security
#
loan platfom
#
exploits
Lookout has discovered almost 300 loan apps that exhibit predatory behaviour, such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment.
Story image
Attackers use automation to increase speed from exploits
Thu, 20th Oct 2022
#
cloud security
#
exploits
#
automation
Attackers are advancing to keep pace with cloud adoption and response time, according to a new report from Lacework.
Story image
52% of ransomware incidents started with compromise of unpatched remote services
Thu, 6th Oct 2022
#
ransomware
#
cybersecurity
#
secureworks
The exploitation in remote services has become the primary initial access vector in ransomware attacks over the past year.
Story image
Cybersecurity loopholes prevalent in South East Asia
Tue, 27th Sep 2022
#
cybersecurity
#
kaspersky
#
exploits
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
Story image
Dramatic uptick in threat activity with exploits growing nearly 150%
Thu, 11th Aug 2022
#
exploits
#
cyber attacks
#
log4j
"While it’s not a surprise given increased attack opportunities like remote work, it’s still a worrying development and one we cannot ignore."
Story image
2021 the year cyber criminals got creative - Proofpoint
Wed, 8th Jun 2022
#
cybersecurity
#
proofpoint
#
exploits
One constant that remains as organisations approach a sense of normalcy after a disruptive year is that cyber criminals continue to target and exploit people.
Story image
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
Thu, 19th May 2022
#
ddos
#
malware
#
advanced persistent threat protection
“Threat actors are quickly adjusting their tactics and these exploits tend to get industry attention, but the threat posed by older and attacks still persists."
Story image
Infoblox's State of Security Report spotlights Australian remote work hazards
Wed, 18th May 2022
#
cybersecurity
#
casb
#
dlp
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Story image
Use of malware, botnets and exploits expands in Q1 2022
Thu, 12th May 2022
#
microsoft
#
malware
#
ddos
"As zero-day attacks and other vulnerabilities among companies like Google and Microsoft come to light, threat actors are quickly adjusting their tactics."
Story image
WordPress vulnerabilities more than doubled in 2021
Thu, 13th Jan 2022
#
cybersecurity
#
wordpress
#
exploits
WordPress vulnerabilities more than doubled in 2021, and 77% of them are exploitable.
Story image
Log4j actively exploited, serious complications can occur according to CERT NZ
Mon, 13th Dec 2021
#
cybersecurity
#
breach prevention
#
java
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Story image
Companies exploited by high-risk vulnerabilities, new research shows
Wed, 4th Nov 2020
#
security vulnerabilities
#
exploits
#
positive technologies
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
Story image
Radiflow launches iRISK for greater visibility into risk and vulnerability
Tue, 11th Feb 2020
#
exploits
#
cyber risk
#
radiflow
Radiflow, the company that provides cybersecurity solutions for industrial automation networks, has launched a business driven industrial risk analytics service known as iRISK.
Story image
US$250,000 up for grabs with Microsoft’s bug bounty
Mon, 19th Mar 2018
#
microsoft
#
cybersecurity
#
exploits
Microsoft has announced the Speculative Execution Side Channel Bounty Program that is offering up to USD$250,000 to people who reveal novel bugs.
Story image
Cisco ASA appliances at risk of denial of service exploit
Tue, 13th Feb 2018
#
cisco
#
exploits
#
acsc
The Australian Cyber Security Centre (ACSC) has issued an official alert to those who use Cisco’s Adaptive Security Appliance (ASA).
Story image
North Korean threat group suspected to be behind Adobe Flash exploit
Mon, 5th Feb 2018
#
martech
#
breach prevention
#
creative technologies
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Story image
Fool me once... ransomware strikes firms twice on average, survey finds
Thu, 1st Feb 2018
#
malware
#
firewall
#
ransomware
“Ransomware is not a lightning strike – it can happen again and again to the same organisation."
Story image
Cybersecurity firm Votiro joins VMware's TAP program
Tue, 31st Oct 2017
#
creative technologies
#
content creation
#
exploits
Israeli-based cybersecurity firm Votiro has joined VMware’s Technology Alliance Partner Program as an access level partner.
Story image
ShadowPad exploit ‘one of the biggest’ APAC supply chain attacks
Tue, 22nd Aug 2017
#
encryption
#
kaspersky
#
exploits
Several recent versions of NetSarang Server Management software were compromised by the ‘ShadowPad’ exploit.
© 2023 TechDay, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.